Information Gathering Using Backtrack

Rating :

Comments

428Mach1at July 06,2015A great (and quick) introduction to the framework of Metasploit. I`d already bought the book. This video saves some time reading the intro. It seems like a powerful tool but I wonder if hacking a network and dropping a payload is as easy (or simple) as I infer it to be. Will watch subsequent videos to see how to do the (ethical) hacking. Anyone spent the $5,000 for the "V-* version" ?

arautat July 20,2015Just like any other videos from eli the computer guy, simple explanation of metasploit and key terms. This was more of a brief introduction to a metasploit .

jhilldog77at September 17,2015When I hear about tools like Metasploit, I remind myself that computers do not infect themselves - they need a human to click on a file or make a mistake. Adobe Products including Flash, Internet Explorer and Windows OS present the most vulnerabilities on our computers today. LINUX or MAC OS anyone?

jhilldog77at September 17,2015..and JAVA! 3 billion devices run on JAVA, always keep it up to date (or don't use)

haygaffat September 17,2015This is my first video for Eli the Computer Guy. Pretty good. He pace of speech and explanation of terms and also how to use Metasploit is very clear..to the point. I can see how he could make an entire video series on this one tool. Maybe he should consider that concept. Take a tool and create several video series with deep details on how to use a tool. I do remember licenses and costs for tools being expensive. With 5K for each user each year, the free version will be what I practice or play around with for educational purposes. I also can appreciate that Metasploit is a framework.